Wireless intrusion detection system and method
First Claim
Patent Images
1. A method, performed by a wireless intrusion detection system, comprising:
- determining, by a processor of the wireless intrusion detection system, locations of a plurality of wireless access devices;
comparing, by the processor, said locations of said plurality of wireless access devices to policy elements applicable to said plurality of wireless access devices; and
creating, by the processor, an alert if a wireless access device of said plurality of wireless access devices violates more than a threshold number of said policy elements.
9 Assignments
0 Petitions
Accused Products
Abstract
A wireless access device in a wireless network, whether a known or unknown entity, can be located using a geolocation system. A signal strength is determined by a wireless intrusion detection system (WIDS) node in a wireless network for each wireless access device that it detects. Based on the signal strength, an approximate distance from the node is determined, which, in one embodiment corresponds to a radius of a circle around the node. To account for error, an approximation band of the circle is calculated that will allow a user to determine the approximate location of the device within the wireless network.
-
Citations
11 Claims
-
1. A method, performed by a wireless intrusion detection system, comprising:
-
determining, by a processor of the wireless intrusion detection system, locations of a plurality of wireless access devices; comparing, by the processor, said locations of said plurality of wireless access devices to policy elements applicable to said plurality of wireless access devices; and creating, by the processor, an alert if a wireless access device of said plurality of wireless access devices violates more than a threshold number of said policy elements. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A wireless intrusion detection system comprising:
-
a memory to store instructions; and a processor to execute the instructions to; determine locations of a plurality of wireless access devices; compare the locations of the plurality of wireless access devices to policy elements applicable to the plurality of wireless access devices; and create an alert if a wireless access device of the plurality of wireless access devices violates more than a threshold number of the policy elements. - View Dependent Claims (8, 9, 10, 11)
-
Specification